Sciweavers

1805 search results - page 57 / 361
» Understanding Code Mobility
Sort
View
DIMVA
2009
13 years 11 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono
ENTCS
2007
104views more  ENTCS 2007»
13 years 10 months ago
Implementing a Distributed Mobile Calculus Using the IMC Framework
In the last decade, many calculi for modelling distributed mobile code have been proposed. To assess their merits and encourage use, implementations of the calculi have often been...
Lorenzo Bettini, Rocco De Nicola, Daniele Falassi,...
SPE
2002
115views more  SPE 2002»
13 years 9 months ago
D'Agents: Applications and performance of a mobile-agent system
D'Agents is a general-purpose mobile-agent system that has been used in several informationretrieval applications. In this paper, we first examine one such application, opera...
Robert S. Gray, George Cybenko, David Kotz, Ronald...
EWSA
2004
Springer
14 years 3 months ago
An Architecture Description Language for Mobile Distributed Systems
Mobile software applications have to meet new requirements directly arising from mobility issues. To address these requirements at an early stage in development, an architecture d...
Volker Gruhn, Clemens Schäfer
KBSE
2008
IEEE
14 years 4 months ago
Semi-Automating Pragmatic Reuse Tasks
Developers undertaking a pragmatic reuse task must collect and reason about information that is spread throughout the source code of a system before they can understand the scope ...
Reid Holmes, Robert J. Walker